Comparison Overview

The Enrichment Center

VS

Autism Response Team

The Enrichment Center

P.O. Box 2446, Madison, AL, 35758, US
Last Update: 2026-01-22

The Enrichment Center is a 501(c)3 non-profit located in Madison, AL. Founded in 2002 by Dr. Larry Little, The Enrichment Center's focus was on providing quality mental health and relationship counseling to the surrounding community. In 2006 The Enrichment Center became the home to the Enrich & Impact Program (E&I), a prevention and intervention counseling program for students in the schools of our surrounding communities. E&I was specifically designed to meet the needs of students who are suffering and have little or no real access to professional counseling services. The Enrich & Impact plan, program, and curriculum were developed by The Enrichment Center based on a needs assessment from area Children’s Policy Council including representatives from local school systems, juvenile court, mental health providers, and healthcare providers which outlined a need to provide effective prevention services for students at-risk. Because no student should go without quality mental health counseling, students and their families do not pay for Enrich & Impact services and The Enrichment Center does not bill insurance for reimbursement of services either. We truly are completely not-for-profit, relying the community to help meet the needs of our students & their families. There is currently not another comparable program to Enrich & Impact in the North Alabama area. Our vision is to have a dedicated E&I counselor in every school in North Alabama. Our mission is to make a difference in the lives of students, their families, and their schools. We are a relationship-driven organization. Our core values are Trust, Investment, & Growth. We believe that by establishing trust and passionately investing in our students we can help them grow into healthy and productive young adults.

NAICS: 621
NAICS Definition:
Employees: 74
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Autism Response Team

undefined, Frisco, Texas, undefined, US
Last Update: 2026-01-22
Between 750 and 799

Autism Response Team was founded 18 years ago by Dr Ali Sadeghi and Dr Leili Zarbakhsh. Dr Ali Sadeghi was a phenomenal clinical psychologist, whom brought the approach of overall family care to ABA. The idea is to focus on the care and support for the full family unit in order to ensure long term success of ABA treatment for the child. Dr Zarbakhsh has over 30 years of experience as an Educational Diagnostician in the school districts, and combined her commitment to effective education with the science of ABA. She received a second PhD in 2018 in Applied Behavior Analysis. They began the agency with a vision to provide the highest quality of care involving consultation across all specialties. Lisa Mousselli, Dr Sadeghi, and Dr Zarbakhsh began Autism Response Team Texas 6 years. Lisa Mousselli has worked in the field of ABA for 16 years, and came to Texas with the vision of bringing this collaborative ABA model to her home state. This agency has now expanded across North Texas and East Texas due to the high demand for effective and efficient services. Autism Response Team Texas began in order to fill a growing need and demand for individualized ABA treatment designed to impact the patient and their families. Our goal is to provide treatment to all ages with fast results, so the family may continue to flourish and attain all goals set forth even after ABA has graduated the patient.

NAICS: 621
NAICS Definition:
Employees: 58
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-enrichment-center-al.jpeg
The Enrichment Center
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/arttx.jpeg
Autism Response Team
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The Enrichment Center
100%
Compliance Rate
0/4 Standards Verified
Autism Response Team
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for The Enrichment Center in 2026.

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Autism Response Team in 2026.

Incident History — The Enrichment Center (X = Date, Y = Severity)

The Enrichment Center cyber incidents detection timeline including parent company and subsidiaries

Incident History — Autism Response Team (X = Date, Y = Severity)

Autism Response Team cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-enrichment-center-al.jpeg
The Enrichment Center
Incidents

No Incident

https://images.rankiteo.com/companyimages/arttx.jpeg
Autism Response Team
Incidents

No Incident

FAQ

The Enrichment Center company demonstrates a stronger AI Cybersecurity Score compared to Autism Response Team company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Autism Response Team company has disclosed a higher number of cyber incidents compared to The Enrichment Center company.

In the current year, Autism Response Team company and The Enrichment Center company have not reported any cyber incidents.

Neither Autism Response Team company nor The Enrichment Center company has reported experiencing a ransomware attack publicly.

Neither Autism Response Team company nor The Enrichment Center company has reported experiencing a data breach publicly.

Neither Autism Response Team company nor The Enrichment Center company has reported experiencing targeted cyberattacks publicly.

Neither The Enrichment Center company nor Autism Response Team company has reported experiencing or disclosing vulnerabilities publicly.

Neither The Enrichment Center nor Autism Response Team holds any compliance certifications.

Neither company holds any compliance certifications.

Neither The Enrichment Center company nor Autism Response Team company has publicly disclosed detailed information about the number of their subsidiaries.

The Enrichment Center company employs more people globally than Autism Response Team company, reflecting its scale as a Mental Health Care.

Neither The Enrichment Center nor Autism Response Team holds SOC 2 Type 1 certification.

Neither The Enrichment Center nor Autism Response Team holds SOC 2 Type 2 certification.

Neither The Enrichment Center nor Autism Response Team holds ISO 27001 certification.

Neither The Enrichment Center nor Autism Response Team holds PCI DSS certification.

Neither The Enrichment Center nor Autism Response Team holds HIPAA certification.

Neither The Enrichment Center nor Autism Response Team holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.